Contexts in source publication

Context 1
... algorithms are generally classified either as private key cryptography or public key cryptography (see Fig. 1 for the cryptography classification ...
Context 2
... algorithms are generally classified either as private key cryptography or public key cryptography (see Fig. 1 for the cryptography classification ...

Similar publications

Article
Full-text available
In the contemporary world, due to crisis of meaning and loss of individual identity, the importance of paying attention to individual growth and attempt for Self-Actualization have become more and more apparent. Self-Actualization is a biological and psychological necessity and the fundamental tendency of every human being to realize his / her pote...

Citations

... Typically operating within a cyclic group, its common application involves the multiplicative group of integers modulo n. The algorithm's security rests on the discrete logarithm problem [2]. Any interloper seeking to decrypt a message faces the daunting task of resolving a discrete logarithm modular equation featuring exceedingly large numbersa challenge that has proven arduous. ...
Article
Full-text available
In the realm of computer science, the speed and efficiency of data processing vary depending on the chosen algorithms and programming languages. This article delves into an exploration of which combinations can yield the highest overall performance. Starting with an introduction to the selected algorithms and languages, the underlying mathematical foundations and principles of each algorithm are presented. The research then shifts its focus to the practical aspect translating these algorithms into executable code. Three specific combinations are tested: RSA algorithm implemented in Python, Elgamal algorithm implemented in Python, and RSA algorithm executed in C++. To ensure reliable results, each combination underwent 30 test iterations, with empirical data subsequently gathered. Two primary comparisons were conducted: the first pitting the Python-based RSA against the Python-based Elgamal, and the second contrasting the Python-based RSA with its C++ counterpart. From these tests, a compelling conclusion emerges. When it comes to transmitting encrypted messages and subsequently decrypting them, the RSA algorithm paired with Python emerges as the most optimal choice. Readers will gain a deeper understanding of the strengths and potential limitations of each pairing, equipping them to make more informed decisions in their cryptographic endeavors.
... Salah satu jenis algoritma dalam kriptografi yaitu algorita RSA cryptosystem. RSA adalah teknik kriptografi kunci publik yang sebagian besar berpusat pada kompleksitas pemfaktoran bilangan prima besar [2].RSA Cryptosystem merupakan sebuah algoritma dalam kriptografi yang menggunakan 2 kunci yang berbeda dalam mengamankan sebuah pesan atau informasi, untuk fungsi yang pertama digunakan untuk mengubah sebuah pesan atau informasi menjadi tidak dapat terdefinisi dan untuk kunci yang kedua digunakan untuk mengembalikan pesan atau informasi yang sudah diubah sebelumnya. ...
Article
Full-text available
Saat ini cukup banyak algoritma yang digunakan untuk pengamanan informasi dalam sistem atau perangkat lunak. Masing-masing algoritma tersebut memiliki tingkat waktu dalam key generate, enrkripsi dan dekripsi yang berbeda-beda. Dalam menggunakan algoritma tersebut harus mempertimbangkan waktu jika ingin menerapkan dalam suatu sistem atau perangkat lunak. Dalam penelitian ini, akan melakukan perbandingan kinerja dari dua algoritma asimetris yaitu Multi Power RSA dan Multi Prime RSA yang masing-masing merupakan varian dari RSA. Algoritma ini terdiri dari 2 kunci yaitu kunci publik dan kunci privat. Pengujian algoritma tersebut akan dilakukan dalam bahasa python. Kesimpulan yang didapat adalah algoritma Multi Prime RSA lebih cepat di bandingkan dengan Multi Power RSA dalam proses enkripsi dan dekripsi. Multi Power RSA lebih cepat dari Multi Prime RSA dalam proses key generate.Currently, quite a lot of algorithms are used to secure information in systems or software. Each of these algorithms has a different level of speed (time) in key generation, encryption and decryption. In using the algorithm must consider speed (time) if you want to implement it in a system or software. In this study, we will compare the performance of two asymmetric algorithms, namely Multi Power RSA and Multi Prime RSA, each of which is a variant of RSA. This algorithm consists of 2 keys, namely the public key and the private key. Testing the algorithm will be carried out in Python. The conclusion obtained is that the Multi Prime RSA algorithm is faster than the Multi Power RSA in the encryption and decryption process. Multi Power RSA is faster than Multi Prime RSA in the key generation process.
... Cryptography is the technique of mixing plain text with a user-specified key to produce an encrypted output known as ciphertext [12]. Cryptographic security requires that if the ciphertext is given, no one can retrieve the original plaintext without the key. ...
Article
Full-text available
The need of keeping medical information safe and secure stems from the fact that doctors rely on it to make accurate diagnoses. If this information is altered in any way, no matter how minor, there is a risk of an inaccurate diagnosis, which could result in severe medical issues and death. The transition from paper to electronic health records (EHRs) has considerably improved patient care quality and efficiency. However, for many healthcare service providers, it has extended the attack surface. Because of the value of a patient’s medical information, this has posed a threat to both patients and healthcare providers. When security is not taken into account in healthcare systems, patients’ privacy is jeopardized. The intended solution to this challenge is to create a modified AES algorithm to secure patient medical information. Although, the AES algorithm is secure, however, there is always a need for improvement on any cryptographic algorithms in terms of computational cost. This study implements AES and modified the last round of the AES and their performance has been measured by scrambling input datasets of various contents and volumes. The experimental results show that modified AES outperforms AES algorithms in terms of Encryption time while AES outperform modified AES in terms of decryption time. Also, the Avalanche effect results revealed that modified AES has a higher avalanche effect for small-size files while a smaller avalanche effect for larger file sizes. This signifies that modified AES security is stronger for a small size file while conventional AES has higher security for larger file sizes. The average encryption time of the AES algorithm for text files is 1513.3ms while the modified AES average encryption time gives 1293.837ms. The average decryption time for conventional AES is 1289.627ms while the average decryption time for modified AES give 1400.136ms. Modified AES uses lesser time complexity during the encryption of all categories of data files while conventional AES uses lesser time complexity during the decryption of all categories of data files.
... It is one of the most extensively used symmetric cryptographic algorithms for data security. Blowfish is regarded as one of the quickest and easiest symmetric algorithms since it is a generally accessible and license-free cryptography technique [15]. Therefore, this study intends to explore the secured method of the Blowfish algorithm by modifying the structure of the F-function to produce a modified version of the Blowfish algorithm. ...
Article
Full-text available
Background: The technological revolution has allowed users to exchange data and information in various fields, and this is one of the most prevalent uses of computer technologies. However, in a world where third parties are capable of collecting, stealing, and destroying information without authorization, cryptography remains the primary tool that assists users in keeping their information secure using various techniques. Blowfish is an encryption process that is modest, protected, and proficient, with the size of the message and the key size affecting its performance. Aim: the goal of this study is to design a modified Blowfish algorithm by changing the structure of the F function to encrypt and decrypt video data. After which, the performance of the normal and modified Blowfish algorithm will be obtained in terms of time complexity and the avalanche effect. Methods: To compare the encryption time and security, the modified Blowfish algorithm will use only two S-boxes in the F function instead of the four used in Blowfish. Encryption and decryption times were calculated to compare Blowfish to the modified Blowfish algorithm, with the findings indicating that the modified Blowfish algorithm performs better. Results: The Avalanche Effect results reveal that normal Blowfish has a higher security level for all categories of video file size than the modified Blowfish algorithm, with 50.7176% for normal Blowfish and 43.3398% for the modified Blowfish algorithm of 187 kb; hence, it is preferable to secure data and programs that demand a high level of security with Blowfish. Conclusions: From the experimental results, the modified Blowfish algorithm performs faster than normal Blowfish in terms of time complexity with an average execution time of 250.0 ms for normal Blowfish and 248.4 ms for the modified Blowfish algorithm. Therefore, it can be concluded that the modified Blowfish algorithm using the F-structure is time-efficient while normal Blowfish is better in terms of security.
... Information security utilizing encryption and decryption is crucial since data transmission and reception are susceptible to outside assault. To increase security, data are transformed into a coded message (encryption) and then recovered into data (decryption) [4]. To offer secure transmission of data and information, several cryptographic algorithms have been proposed, which can be classified as symmetric and asymmetric cryptographic techniques [5]. Figure 1 displays the process the plaintext passed through before turning into ciphertext and then back into plaintext. ...
... The study lacks a proper way to ensure complete data security. 4 Saleh and Meinel [12] HPISecure was used to secure the HTTP client. ...
Article
Full-text available
With the explosion of connected devices linked to one another, the amount of transmitted data grows day by day, posing new problems in terms of information security, such as unauthorized access to users’ credentials and sensitive information. Therefore, this study employed RSA and ElGamal cryptographic algorithms with the application of SHA-256 for digital signature formulation to enhance security and validate the sharing of sensitive information. Security is increasingly becoming a complex task to achieve. The goal of this study is to be able to authenticate shared data with the application of the SHA-256 function to the cryptographic algorithms. The methodology employed involved the use of C# programming language for the implementation of the RSA and ElGamal cryptographic algorithms using the SHA-256 hash function for digital signature. The experimental result shows that the RSA algorithm performs better than the ElGamal during the encryption and signature verification processes, while ElGamal performs better than RSA during the decryption and signature generation process.
... Asymmetric algorithms involve public and private keys and separate into primary key and secondary key arrangements. The private key is kept secret from other parties and used for decoding while the public key is accessible to everybody and used for encoding [13]. Rivest-Shamir-Adleman (RSA), elliptic-curve cryptography, and asymmetric utilities are a few examples that work with the asymmetric algorithm [10]. ...
Article
Full-text available
Secure data sharing is crucial for protecting sensitive information, and the use of cryptographic protocols, such as the Secure Shell (SSH) protocol, provides an efficient way to achieve this. Found a novel proposed authentication system that combines cryptography and machine learning techniques to ensure secure data sharing within a federated cloud services environment. Their approach involves mutual authentication to establish trust between cooperating entities, threat detection using machine learning algorithms, and cryptography-based key agreement for secure data exchange. They evaluated different classifiers and found that LR, KNN, and DT achieved higher accuracy in malware prediction. Founded another approach where a data-sharing scheme for cloud storage that emphasizes security and efficiency. They introduced a secure cloud storage model utilizing a semi-trusted third party (STTP) for user management, key management, and data processing. By combining a hybrid encryption scheme with a re-encryption protocol, they ensured data confidentiality, unforgeability, and user-centricity. These studies highlight the importance of cryptography in secure data sharing and propose innovative techniques to enhance security and efficiency in data sharing.